Articles on Hackers

Displaying 1 - 20 of 68 articles

It’s been reported that names, addresses, dates of birth, phone numbers, personal email addresses and emergency contact details, tax file numbers, payroll information, bank account details, passport details and student academic records were accessed. www.shutterstock.com

19 years of personal data was stolen from ANU. It could show up on the dark web

The worst-case scenario is that hackers still have access to the university systems via a backdoor and are siphoning off critical data as it emerges.
Biometrics like retinal scans is a new frontier in the privacy wars. Reuters/Mike Blake

Congress is considering privacy legislation – be afraid

States like California have been at the forefront of privacy innovation in recent decades. A possible federal law could bring their experimentation to a halt, harming consumers.
A sign marks the location of a Chicago Marriott. In November 2018 the hotel chain said their guest reservation database was hacked, compromising the security of up to 500 million customers. Scott Olson/AFP

Marriott data breach: 500 million times concerned

The November 30, 2018, Marriott International announced a data breach concerning 500 million clients, the second biggest ever. With new data breaches announced nearly every day, how , everyone is now wondering how this was possible.
Bad news on the doorstep. How to stay safe? Shutterstock.

Viruses and malware: are we protecting ourselves adequately?

Like the recent WannaCry, viruses and other hacker software are now part of our digital lives. How big are the threats? How can we protect ourselves?
Some Peace Corps volunteers already provide computer assistance and instruction. Peace Corps

Is it time for a Cyber Peace Corps?

The US could help solve a global security problem and boost its image abroad by helping willing experts share their cybersecurity knowledge around the country and the globe.
Staff at the Korea Internet and Security Agency in Seoul, South Korea monitor possible ransomware cyberattacks in May 2017. (Yun Dong-jin/Yonhap via AP)

Ransomware like Bad Rabbit is big business

Like legitimate e-commerce, ransomware e-crime is increasing in scale, value and sophistication.
Cloud computing has become every-day tool, but its security is questionable. New methods are developed to prevent data breaches. Mark Warner/Flickr

Why we need to improve cloud computing’s security

Cloud computing is on the rise, but so are questions about its security. This is why we need systems where the data itself enforces security, not just the cloud system within which it is contained.
There’s a global war going on, and a global arms race to go with it. It’s not a race for physical weapons, it’s a race to develop cyber weapons of psychological, emotional, financial and infrastructure attack. (Shutterstock)

World War Three is being waged in cyberspace

Hostile foreign powers and even tech companies are not attacking us with bullets and bombs; they're doing it with bits and bytes. It's Cyber Security Awareness Month, so what to do about the third world war being waged in cyberspace?

Top contributors

More